Results 41 to 50 of about 6,690 (268)

Secrecy Rate Region Enhancement in Multiple Access Wiretap Channel

open access: yesJournal of Telecommunications and Information Technology, 2022
It is commonly known that physical layer security is achieved with a trade-off in terms of the achievable rate. Hence, security constraints generate rate losses in wiretap channels.
Shahid Mehraj Shah
doaj   +1 more source

On the Binary Input Gaussian Wiretap Channel with/without Output Quantization

open access: yesEntropy, 2017
In this paper, we investigate the effect of output quantization on the secrecy capacity of the binary-input Gaussian wiretap channel. As a result, a closed-form expression with infinite summation terms of the secrecy capacity of the binary-input Gaussian
Chao Qi, Yanling Chen, A. J. Han Vinck
doaj   +1 more source

A Model for Adversarial Wiretap Channels

open access: yesIEEE Transactions on Information Theory, 2016
In wiretap model of secure communication the goal is to provide (asymptotic) perfect secrecy and reliable communication over a noisy channel that is eavesdropped by an adversary with unlimited computational power. This goal is achieved by taking advantage of the channel noise and without requiring a shared key.
Wang, Pengwei, Safavi-Naini, Reihaneh
openaire   +2 more sources

The Wiretapped Diamond-Relay Channel [PDF]

open access: yesIEEE Transactions on Information Theory, 2018
30 pages, 4 figures, Submitted to IEEE Transactions on Information ...
Si-Hyeon Lee, Ashish Khisti
openaire   +3 more sources

On the Physical Layer Security Peculiarities of Wireless Communications in the Presence of the Beaulieu-Xie Shadowed Fading

open access: yesMathematics, 2022
The article presents an analysis of the physical layer security of a wireless communication system functioning in the presence of multipath fading and a wiretap.
Aleksey S. Gvozdarev   +1 more
doaj   +1 more source

Optimization of Code Rates in SISOME Wiretap Channels

open access: yes, 2015
We propose a new framework for determining the wiretap code rates of single-input single-output multi-antenna eavesdropper (SISOME) wiretap channels when the capacity of the eavesdropper's channel is not available at the transmitter.
Geraci, Giovanni   +4 more
core   +1 more source

Semantically Secure Lattice Codes for Compound MIMO Channels [PDF]

open access: yes, 2018
We consider compound multi-input multi-output (MIMO) wiretap channels where minimal channel state information at the transmitter (CSIT) is assumed.
Belfiore, Jean-Claude   +2 more
core   +2 more sources

Polar Coding for Confidential Broadcasting

open access: yesEntropy, 2020
A polar coding scheme is proposed for the Wiretap Broadcast Channel with two legitimate receivers and one eavesdropper. We consider a model in which the transmitter wishes to send the same private (non-confidential) message and the same confidential ...
Jaume del Olmo Alòs   +1 more
doaj   +1 more source

Exact Random Coding Secrecy Exponents for the Wiretap Channel

open access: yes, 2016
We analyze the exact exponential decay rate of the expected amount of information leaked to the wiretapper in Wyner's wiretap channel setting using wiretap channel codes constructed from both i.i.d. and constant-composition random codes. Our analysis for
Merhav, Neri   +2 more
core   +1 more source

A New Physical Layer Security Scheme Based on Adaptive Bit Channel Selection for Polar-Coded OFDM

open access: yesIEEE Open Journal of Vehicular Technology
We propose a new physical layer security scheme for a wiretap channel in polar-coded OFDM-based wireless communication systems. Our approach is based on the adaptive bit channel selection, where the input bit channels of polar code are selected according
Yuki Kuraya, Hideki Ochiai
doaj   +1 more source

Home - About - Disclaimer - Privacy